首页> 外文会议>Association for Computing Machinery Conference on Computer and Communications Security >Forward-Secure Signatures in Untrusted Update Environments: Efficient and Generic Constructions
【24h】

Forward-Secure Signatures in Untrusted Update Environments: Efficient and Generic Constructions

机译:在不受信任的更新环境中的前向安全签名:高效和通用的结构

获取原文

摘要

Forward-secure signatures (FSS) prevent forgeries for past time periods when an attacker obtains full access to the signer's storage. To simplify the integration of these primitives into standard security architectures, Boyen, Shacham, Shen and Waters recently introduced the concept of forward-secure signatures with untrusted updates where private keys are additionally protected by a second factor (derived from a password). Key updates can be made on encrypted version of signing keys so that passwords only come into play for signing messages. The scheme put forth by Boyen et al. relies on bilinear maps and does not require the random oracle. The latter work also suggested the integration of untrusted updates in the Bellare-Miner forward-secure signature and left open the problem of endowing other existing FSS systems with the same second factor protection. This paper solves this problem by showing how to adapt the very efficient generic construction of Malkin, Micciancio and Miner (MMM) to untrusted update environments. More precisely, our modified construction - which does not use random oracles either - obtains a forward-secure signature with untrusted updates from any 2-party multi-signature in the plain public key model. In combination with Bellare and Neven's multi-signatures, our generic method yields implementations based on standard assumptions such as RSA, factoring or the hardness of computing discrete logarithms. Like the original MMM scheme, it does not require to set a bound on the number of time periods at key generation.
机译:前向安全签名(FSS)防止攻击者从签名者存储的完全访问时验证过去的时间段。为了简化这些基元将这些基元集成到标准安全架构中,Boyen,Shacham,Shen和Waters最近引入了前向安全签名的概念,其中包含不受信任的更新,其中私钥通过第二个因素(源自密码)进行保护。可以在加密版本的签名键上进行键更新,以便密码仅用于签名消息。 Byben等人提出的计划。依靠双线性地图,不需要随机甲骨文。后一项工作还建议在Bellare-Miner前期安全签名中集成不受信任的更新,并留下具有相同第二因子保护的其他现有FSS系统的问题。本文通过展示如何使Malkin,Micciancio和Miner(MMM)的非常有效的通用构建适应不受信任的更新环境,解决了这个问题。更确切地说,我们的修改结构 - 不使用随机oracelles - 从普通公钥模型中的任何2方多签名中获取前向安全签名。与Bellare和Neven的多签名相结合,我们的通用方法基于RSA,分解或计算离散对数的硬度等标准假设来产生实现。与原始的MMM方案一样,它不需要在关键生成时设置绑定时间段。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号